Presentation is loading. Please wait.

Presentation is loading. Please wait.

Group N – December 4 th, 2008 JEM Networking Solutions.

Similar presentations


Presentation on theme: "Group N – December 4 th, 2008 JEM Networking Solutions."— Presentation transcript:

1 Group N – December 4 th, 2008 JEM Networking Solutions

2 Critical Points  A network planned and built around redundancy should be implemented for facilitating XYZ Hospital’s needs and tasks. – 99.99% Uptime  A network that is easy to use, manipulate, and troubleshoot should be adopted.  As far as hardware it is XYZ Hospital’s best interest to disregard cost due to the nature of the business. However, JEM Networking will only supply the highest standards of price to quality products ratio.  All policies should govern the network to keep it secure, efficient, and productive.  A disaster recovery plan should be implemented in order to prepare for lost data, uncontrollable disasters, and hardware failure. Kight

3 Organized Layout  Buildings connected through VPN  Use of Switches, Routers, WAPs, P2PWAPs  Simple and EfficientDevices  Routers/Switches ◦ Cisco - Linksys Gigabit Security Router with VPN RVS4000 ◦ Cisco 24 Port 10/100btx 2- GBIC Ports DC-Pwrd STD Multilayer SW  P2PWAP/WAPs ◦ 5GHz Complete Wireless Bridge Kit ◦ Cisco - Linksys Wireless-G Exterior Access Points  CAT6 Cable Kight

4 Laptops  Dell Vostro 1310 ◦ Windows XP ◦ Core 2 Duo - 1.8GHz ◦ 3GB DDR2 ◦ 160 GB Hard DriveServers  Servers – Alpha / Bravo  IBM System x3350 ◦ Windows Server 2003 ◦ 8GB RAM ◦ RAID 0+1, 5 Capable ◦ Xeon 3.0Ghz/12MB/1333 MHz Workstations  Dell Precision T3400 ◦ Windows XP ◦ Intel Q6600 2.4GHz Processor ◦ 2GB RAM, DDR2 ◦ 160 GB Hard Drive ◦ 19” Widescreen Flat Panel Kennedy

5 McCaughan

6 McCaughan

7 McCaughan

8 McCaughan

9 McCaughan

10 Kennedy Quantity of ItemsHardware/DevicesPrice x2IBM x3350 Server$5500 Each x30CyberPower Cp600LCD 340W$30 Each x1 Guardian Elite 100 kW Generator $18,800 Each x61000ft Shielded CAT6 Cable$170 Each x1 Cisco Basic 5GHz Complete Wireless Bridge Kit $1000 Each x20 The Linksys Wireless-G Exterior Access Point $500 Each x25Dell Precision T3400$1020 Each x200Dell Vostro 1310 Laptops$729 Each x5 Cisco 24 Port 10/100btx 2- GBIC Ports DC-Pwrd STD Multilayer SW $3200 Each x4 Linksys 4 Port Gigabit Security Router with VPN RVS4000 $160 Each x5 D ell 2335dn Laser Printer $449 Each Total:$232,905

11 ESET  Firewall  Virus Protection  Anti-Spam Mail FilterWPA2  Wi-Fi Protected Access  Wi-Fi Alliance ApprovedPGP  Pretty Good Privacy  Data Encryption Security Software Barkiewicz

12 Hot Site  CA ARCserve  Replication and Failover to a replica server  Dual Back Up  Variety of OS support  Base SuiteUtilities  Onsite Hardware o Gas Generator o Backup Device Batteries Barkiewicz Disaster Recovery

13 Polices  Natural Disasters  Differential Backup Utilization  Dual Back-Up Planning  UPS ◦ Testing ◦ Usage  RAID 5 System Disaster Recovery Barkiewicz HardwareComputersSystem NetworkApplications Down Time:MAX 10 Minutes

14  Email Policy ◦ Prohibit creation or distribution of offensive messages ◦ Accounts not to be used for personal reasons ◦ No expectation of privacy  Internet Hardware Policy ◦ Equipment must be administered by approved personnel ◦ Must be configured accordingly Network Policies Machnic

15  Internet Access Policy ◦ Prohibited uses including sites with blocked content ◦ May not illegally copy material that is copyrighted ◦ No communication of sensitive material ◦ Must access Internet through approved firewall ◦ Users waive right to privacy  Wireless Communication Policy ◦ All wireless devices must comply with company policy ◦ Use of authentication techniques Network Policies Machnic

16  Naming Conventions ◦ Primary server named Alpha; secondary named Bravo ◦ Other components use abbreviated hierarchy including building, department, component type, and number  MAINHRWS1 – MAIN building, Human Resources Department, Workstation, 1 Machnic

17 Security  Passwords ◦ Minimum 14 characters for administrators ◦ Minimum 7 characters for other users ◦ Combination of:  Numbers, letters and symbols  Both upper and lower case characters  No dictionary words ◦ Changed every 90 days ◦ Not based on personal information ◦ Ensures security to systems  Physical ◦ Computers and towers locked down at all times ◦ Activated password protection screen savers ◦ Biometric hand scanner used for securing server room Security Policies Machnic

18 Logging  Firewall ◦ Configured to detect emergencies ◦ Detects alerts, critical conditions and error messages ◦ Logs and detects multiple failed login attempts  Retention ◦ Health information: 6 Years ◦ Network and System logs: 90 days includes:  Operating system logs  Email records  Software violation logs  IDS software logs Security Policies Machnic

19 Access  User Account ◦ Made by management ◦ Consequences for misuse  Degrading performance of systems  Controlling systems  Create programs to gain unauthorized access ◦ Personal devices are prohibited  Wireless ◦ WAP abide by regulations and laws ◦ Require user authentication ◦ Wireless Passwords and data must be encrypted Security Policies Machnic

20 Group N


Download ppt "Group N – December 4 th, 2008 JEM Networking Solutions."

Similar presentations


Ads by Google